Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Securing Im and P2P Applications for the Enterprise

Buy
Are You Ready for the Network Equivalent of Guerrilla Warfare?

Instant Messaging (IM) and Peer-to-Peer (P2P) applications are taking over the workplace as P2P transfers now account for 70% of all Internet traffic and more than 50% of corporate workstations are running an IM application. IT professionals face the challenge of managing and securing these applications, which last year were the point of entry into corporate networks for 40% of all computer viruses and worms. This book is for system administrators and security professionals who need to bring now ubiquitous IM, P2P, and IRC applications under their control. It provides specific protection strategies for the network and application layers by identifying and blocking malicious traffic.

  • Grasp Instant Messaging Security Issues See how IM bypasses any gateway antivirus scanning that would normally protect a network from infection.
  • Bypass AIM Restrictions Learn what to do about free AIM proxies that are available throughout the Internet.
  • Understand the Yahoo! Messenger Architecture Find out why its ability to use any available port to authenticate and begin communication makes it so difficult to block.
  • Manage Skype Vulnerabilities Do you know the differences between a standard node, a super node, and a Skype server?
  • The Biggest P2P You've Never Heard Of Meet the network behind Kazaa, Morpheus, Grokster, and iMesh.
  • Explore the World of Internet Relay Chat (IRC) Find out what makes IRC so attractive to cyber-criminals and predators.
  • DDoS Botnets Turned Bot-Armies Bot Masters make certain each infected machine will connect silently to the IRC server at the point of infection and on startup.
  • Methods for Botnet Control Understanding these methods will help you locate and remove such threats before they grow and become a problem.

  • Instant messaging (IM) and peer-to-peer services are steadily increasing in popularity and are becoming a greater concern for security professionals and network administrators. Instant messaging usage has increased dramatically in recent years, and has become a mainstay in corporate environments, with or without the approval of networking and security groups. According to a study by the Radicati Group published in July 2004, instant messaging is used in 85% of corporate environments in North America. According to the report, it was forecast that there would be 362 million instant messaging users in corporate environments, with768 million accounts, using the same public instant messaging services available to home users.
    (HTML tags aren't allowed.)

    From Bricks to Brains: The Embodied Cognitive Science of LEGO Robots (Au Press)
    From Bricks to Brains: The Embodied Cognitive Science of LEGO Robots (Au Press)

    From Bricks to Brains introduces embodied cognitive science and illustrates its foundational ideas through the construction and observation of LEGO Mindstorms robots.

    Discussing the characteristics that distinguish embodied cognitive science from classical cognitive science, the book places a renewed emphasis on sensing and acting,...

    Semantic Web Programming
    Semantic Web Programming
    The next major advance in the Web?Web 3.0?will be built on semantic Web technologies, which will allow data to be shared and reused across application, enterprise, and community boundaries. Written by a team of highly experienced Web developers, this book explains examines how this powerful new technology can unify and fully leverage the...
    Beginning Android 3D Game Development
    Beginning Android 3D Game Development

    Beginning Android 3D Game Development is a unique, examples-driven book for today's Android and game app developers who want to learn how to build 3D game apps that run on the latest Android 5.0 (KitKat) platform using Java and OpenGL ES.

    Android game app development continues to be one of the hottest...


    Eye Movements: A Window on Mind and Brain
    Eye Movements: A Window on Mind and Brain
    Eye-movement recording has become the method of choice in a wide variety of disciplines investigating how the mind and brain work. This volume brings together recent, high-quality eye-movement research from many different disciplines and, in doing so, presents a comprehensive overview of the state-of-the-art in eye-movement research.
    ...
    eMarketing eXcellence, Third Edition: Planning and optimising your digital marketing (Emarketing Essentials)
    eMarketing eXcellence, Third Edition: Planning and optimising your digital marketing (Emarketing Essentials)

    E-marketing impacts all aspects of marketing from strategy and planning through the marketing mix, marketing communications and buyer behaviour to marketing research. eMarketing eXcellence highlights the most significant opportunities, pitfalls and defines the new marketing approaches needed. It highlights best practice in applying digital...

    The Book of Overclocking: Tweak Your PC to Unleash Its Power
    The Book of Overclocking: Tweak Your PC to Unleash Its Power

    The Book of Overclocking is the definitive guide to the art of running a PC’s processor faster than the manufacturer ever intended. Not only can overclocking help you squeeze another year or two out of older hardware, but maximizing your PC’s performance is also a lot of fun. Whether you’re a veteran overclocker or a...

    ©2021 LearnIT (support@pdfchm.net) - Privacy Policy